Certified Ethical Hacker (CEHv9) Questions and answers
115. Which of the following parameters describe LM Hash:
I - The maximum password length is 14 characters. II - There are no distinctions between uppercase and lowercase. III - It's a simple algorithm, so 10,000,000 hashes can be generated per second.
A. I and II
B. I, II, and III
116. You are the Systems Administrator for a large corporate organization. You need to monitor all network traffic on your local network for suspicious activities and receive notifications when an attack is occurring. Which tool would allow you to accomplish this goal?